Professional Documents
Culture Documents
Prepared by
Dr. B. Muruganantham
Assistant Professor
Department of Computer Science and
Engineering
SRMIST, Chennai
References :
2) Charu C. Aggarwal, Philip S Yu, “Privacy Preserving Data Mining”: Models and
Algorithms, Kluwer Academic Publishers, 2008
3) Ron Ben Natan, ”Implementing Database Security and Auditing”, Elsevier Digital
Press, 2005.
Dr.B.Muruganantham /AP/CSE/SRMIST
15CS338E – DATABASE SECURITY AND PRIVACY
UNIT I : SECURITY ARCHITECTURE & OPERATING SYSTEM SECURITY FUNDAMENTALS
Security Architecture:
Introduction
Information Systems
Database Management Systems
Information Security Architecture
Database Security
Asset Types and value
Security Methods
Operating System Security Fundamentals:
Introduction
Operating System Overview
Security Environment
Components
Authentication Methods
User Administration
Password Policies
Vulnerabilities
E-mail Security
Dr.B.Muruganantham /AP/CSE/SRMIST
Security Architecture: Introduction
Security is Avoiding unauthorised access ( with limited time
duration , not always)
Security violations and attacks are increased globally at an average rate of 20%.
Statistics shows that virus alerts, email spamming, identity theft, data theft, and types
of security breaches on the rise.
Database Security is the degree to which all the data is fully protected from tampering
or unauthorised acts.
The great challenge is to develop a new database security policy to secure data and
prevent integrity data violations.
Most of the DBMS did not have a security mechanism for authentication and
encryption until recently.
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems
In today’s global market , corporate companies all
over the world to gain a portion of market share.
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Characteristics of Information System categories
Category Characteristics Typical Application
System
Also Known as ONLINE TRANSACTION Order tracking
PROCESSING (OLTP)
Customer service
Used for operational tasks
Payroll
Transaction Provides solutions for structured problems
Processing Accounting
System (TPS) Includes business transactions
Student Registration
Logical Components of TPS applications ( Derived
from business procedures , business rules and Sales
policies)
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Characteristics of Information System categories …
Category Characteristics Typical Application
System
Captures reasoning of human experts Virtual University
Simulation
Executive Expert Systems(EESs) are a type of
expert system used by top level management Financial Enterprise
for strategic management goals
Statistical Trading
A branch of Artificial Intelligence within the
field of computer science studies Loan Expert
Expert System
(ES) Software consists of : Market Analysis
Knowledge Base
Inference Engine
Rules
People Consists of :
Domain Experts
Knowledge Engineers
Power Users
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
Components of Information System
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Systems …
• Components of Information System …
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Management System
Database :
Mainly used for storing and retrieving the data for processing
Request and Reply protocols are used to communicate client and server
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Management System …
DBMS
Purpose of DBMS
Integrity problems
Atomicity of updates
Security problems
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Management System …
DBMS Architecture
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture
Information Security
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture …
CIA Triangle
Confidentiality Integrity
Information is classified into Information is accurate and protected
from tampering by unauthorised
different levels of confidentiality persons
to ensure that only authorised
Information is consistent and validated
users access the information
Availability
Information is available all the times only
for authorised and authenticated persons
System is protected from being shutdown
due to external or internal threats or attacks
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture …
Logical
and
Physical Assets
Dr.B.Muruganantham /AP/CSE/SRMIST
Information Security Architecture …
Components of Information Security Architecture
Policies and Procedures
- Documented procedures and company policies that
elaborate on how security is to be carried out
Security personnel and Administrators
- People who enforce and keep security in order
Detection equipment
- Devices that authenticate employees and Detect equipment that is
prohibited by the company
Security Programs
- Tools that protect computer systems’ server
Monitoring Equipment
- Devices that monitor physical properties , employees and other
important assets
Monitoring Applications
- Utilities and applications used to monitor network traffic and Internet
activities
Auditing Procedures and Tools
- Checks and Controls put in place to ensure that security measures are
working Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security
One of the functions of DBMS is to empower DBA to implement and
enforce security at all levels of security
A security access point is a place where database security must be
protected and applied
The Security access points illustrated in the below figure
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Access Points
People – Individuals who have been granted privileges and permissions to
access networks, workstations, servers, databases, data files and data
Network – One of the most sensitive security access points. Protect the network
and provide network access only to applications, operating systems and databases.
Data files – Another access point that influences database security enforcement
is access to data files where data resides.
Data – The data access point deals with data design needed to enforce data
integrity
Dr.B.Muruganantham /AP/CSE/SRMIST
Database security enforcement
Dr.B.Muruganantham /AP/CSE/SRMIST
Data Integrity violation process
Security gaps are points at which security is missing and the systems is vulnerable.
Vulnerabilities are kinks in the system that must be watched because they can
become threats.
In the world of information security , a threat is defined as a security risk that has
high possibility of becoming a system breach.
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Levels
Dr.B.Muruganantham /AP/CSE/SRMIST
Menaces to Databases
Security vulnerability
– A weakness in any of the information system components that can be
system
Security Threat
– A security violation or attack that can happen any time because of
a security vulnerability
Security risk
– A known security gap that a company intentionally leaves open
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Vulnerabilities
Vulnerability means “ Susceptible to Attacks” ( Source :www.dictionary.com)
Intruders, Attackers and Assailers exploit vulnerabilities in Database environment to
prepare and start their attacks.
Hackers usually explore the weak points of a system until they gain entry
Once the intrusion point is identified , Hackers unleash their array of attacks
Virus
Malicious Code
Worms
Other Unlawful violations
To protect the system the administrator should understand the types of
vulnerabilities
The below figure shows the types of vulnerabilities
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Vulnerabilities …
Category Description Examples
Installation Results from default Incorrect application
and installation configuration
Configuration Configuration that is known Failure to change default
publicly passwords
Does not enforce any Failure to change default
security measures privileges
Improper configuration or Using default installation
Installation may result in which does not enforce high
security risks security measures
User Mistakes Security vulnerabilities are Lack of Auditing controls
tied to humans too Untested recovery plan
Carelessness in Lack of activity monitoring
implementing procedures Lack of protection against
Failure to follow through malicious code
Accidental errors Lack of applying patches as
they are released
Bad authentication or
implementation
Social Engineering
Lack of technical
information
Susceptibility to scam
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Vulnerabilities …
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of threats
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of threats , definitions and examples
Threat type Definition Examples
People People intentionally or Employees
unintentionally inflict Govt. Authorities or Person who
damage, violation or are in charge
destruction to all or any of the Contractors
database components Consultants
(People, Applications, Visitors
Networks, OS, DBMS, Data Hackers
files or data) Organised Criminals
Spies
Terrorists
Social Engineers
Malicious Software Code that in most Viruses
Code cases is intentionally written Boot Sector Viruses
to damage or violate one or Worms
more database environment Trojon Horses
components (People, Spoofing Code
Applications, Networks, OS, Denial-of-service flood
DBMS, Data files or data) Rookits
Bots
Bugs
E-Mail Spamming
Back Door
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of threats , definitions and examples
Dr.B.Muruganantham /AP/CSE/SRMIST
Examples of Malicious Code
Virus – Code that compromises the integrity and state of the system
Boot Sector Virus – Code that compromises the segment in the hard disk that
contains the program used to start the computer
Worm – Code that disrupts the operation of the system
Trojon Horses – Malicious code that penetrates a computer system or network
by pretending to be legitimate coded
Spoofing Code – Malicious code that looks like a legitimate code
Denial-of-service-flood – The act of flooding a web site or network system with
many requests with the intent of overloading the system and forcing it to deny
service legitimate requests
Rootkits and Bots – Malicious or Legitimate code that performs such functions
as automatically retrieving and collecting information from computer system
Bugs - Code that is faulty due to bad design, logic or both
E-Mail Spamming – E-Mail that is sent to may recipients without their
permission
Back door – An intentional design element of software that allows developers of
the system to gain access to the application for maintenance or technical
problems
Dr.B.Muruganantham /AP/CSE/SRMIST
Types of Threats
Managers at all the levels are constantly working to assess and mitigate risks to
ensure the continuity of the department operations.
Administrators should understand the weakness and threats related to the system
Dr.B.Muruganantham /AP/CSE/SRMIST
Definitions and examples of Risk types
Dr.B.Muruganantham /AP/CSE/SRMIST
Asset Types and Their Values
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methods
Security methods used to protect database environment components
Database
Component Security Methods
Protected
People Physical limits on access to hardware and documents
Through the process of identification and authentication make
certain that the individual is who is claim s to be through the use of
devices, such as ID cards, eye scans, and passwords
Training courses on the importance of security and how to guard
assets
Establishment of security policies and procedures
Applications Authentication of users who access applications
Business rules
Single sign-on ( A method for signing on once for different
applications and web sites)
Network Firewalls to block network intruders
Virtual Private Network (VPN)
Authentication
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methods …
Database Component
Protected Security Methods
OS Authentication
Intrusion Detection
Password Policies
User accounts
DBMS Authentication
Audit Mechanism
Database resource limits
Password poilicy
Data files File permission
Access Monitoring
Data Data Validation
Data Constraints
Data Encryption
Data Access
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methodology
The below figure presents database security methodology side by side
with the software development life cycle (SDLC) methodology
Dr.B.Muruganantham /AP/CSE/SRMIST
Database Security Methodology…
The following list presents the definition of each phase of the
database security methodology
Dr.B.Muruganantham /AP/CSE/SRMIST
Operating System Security Fundamentals
Dr.B.Muruganantham /AP/CSE/SRMIST
Operating System Security Fundamentals …
Multitasking
Multisharing
Macintosh by Apple
Dr.B.Muruganantham /AP/CSE/SRMIST
The OS Security Environment
Bank Building – OS
Safe – DB
Money - Data
Dr.B.Muruganantham /AP/CSE/SRMIST
The Components of an OS Security Environment
Dr.B.Muruganantham /AP/CSE/SRMIST
Services
Users employ these utilities to gain access to OS and all the features
the users are authorised to use.
If the services are not secured and configured properly , each service
becomes a vulnerability and access point and can lead to a security
threat.
Dr.B.Muruganantham /AP/CSE/SRMIST
Files
File Permission
File Transfer
File Sharing
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
File Permission
• Every OS has a method of implementing file permission to grant read, write or
execute privileges to different users.
• The following figure gives how the file permissions are assigned to a user in windows
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
In UNIX, file permissions work differently than windows.
For each file there are three permission settings
Each setting consists of rwx ( r – read, w – write and x – execute)
1. First rwx is Owner of the file
2. Second rwx is Group to which owner belongs
3. Third rwx is All other users
The given images gives the details of UNIX file permission.
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
File Transfer – moving the file from one location to another location in a
disk/web/cloud
FTP is an Internet service that allows transferring files from one computer to
another
FTP clients and servers transmit usernames and passwords in plaintext
format( Not Encrypted). This means any hacker can sniff network traffic and
be able to get the logon information easily.
Files also transferred as plaintext format
A root account cannot be used to transfer file using FTP
Anonymous FTP is the ability to log on to the FTP server without being
authenticated.
This method is usually used to provide access to files in the public domain.
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
Never use the normal FTP Utility. Instead, use the secure FTP utility , if
possible.
Make two FTP directories: one for file uploads with write permission
only and another one file is for file downloads with read permission.
Use specific accounts for FTP that do not have access to any files or
directories outside the file UPLOAD and DOWNLOAD directories.
Turn on logging , and scan the FTP logs for unusual activities on a
regular basis.
Allow only authorized operators to have FTP privileges.
Dr.B.Muruganantham /AP/CSE/SRMIST
Files …
Sharing files naturally leads to security risks and threats
The peer-to-peer technology is on rise( very well developed now)
Peer-to-Peer programs allow users to share the files over internet
If you were conduct a survey of users that use Peer-to-Peer programs,
majority of the users’ machines are infected with some sort of virus,
spyware, or worm.
Most companies prohibit the use of such programs.
The main reason for blocking these programs are
Malicious Code
Adware and spyware
Privacy and confidentiality
Pornography
Copy right issues
Dr.B.Muruganantham /AP/CSE/SRMIST
Memory
You may wonder how memory is an access points to security violations
There are many badly written programs and utilities that could change
the content of memory
Although these programs do not perform deliberate destructions acts.
Dr.B.Muruganantham /AP/CSE/SRMIST
Authentication Methods
Dr.B.Muruganantham /AP/CSE/SRMIST
Digital Authentication used by many OS
Digital Certificate
Widely used in e-commerce
Is a passport that identifies and verifies the holder of the certificate
Is an electronic file issued by a trusted party ( Known as certificate authority ) and cannot
be forged or tampered with.
Digital Card
Also known as security card or smart card
Similar to credit card in dimensions but instead of magnetic strip
It has an electronic circuit that stores the user identification information
Kerberos
Developed by Massachusetts Institute of Technology (MIT) , USA
It is to enable two parties to exchange information over an open network by assigning a
unique key. Called ticket , to each user.
The ticket is used to encrypt communicated
Dr.B.Muruganantham messages
/AP/CSE/SRMIST
Digital Authentication used by many OS …
Lightweight Directory Access Protocol (LDAP)
Developed by University of Michigan, USA
Uses centralized directory database storing information about people,
offices and machines in a hierarchical manner
LDAP directory can be easily distributed to many network servers.
You can use LADP to store information about
• Users (User name and User id)
• Passwords
• Internal telephone directory
• Security keys
Use LADP for these following reasons
• LDAP can be used across all platforms ( OS independent )
• Easy to maintain
• Can be employed for multiple purposes
LDAP architecture is Client / Server based
Dr.B.Muruganantham /AP/CSE/SRMIST
Digital Authentication used by many OS …
Dr.B.Muruganantham /AP/CSE/SRMIST
Digital Authentication used by many OS …
Dr.B.Muruganantham /AP/CSE/SRMIST
Authorization
Dr.B.Muruganantham /AP/CSE/SRMIST
User Administration
Dr.B.Muruganantham /AP/CSE/SRMIST
Vulnerabilities of OS
Dr.B.Muruganantham /AP/CSE/SRMIST
E-mail Security
E-mail may be the tool most frequently used by hackers to exploit viruses, worms,
E-mail was the medium used in many of the most famous worm and virus attacks
For example :
Love Bug Worm
I LOVE YOU worm
Mydoom worm
Melissa virus
E-mail is not only to used to send viruses and worms, nut to send spam e-mail, private and
Dr.B.Muruganantham /AP/CSE/SRMIST